By mid-2004, an analytical attack was finished in just one hour that was able to make collisions for the total MD5.How can it ensure that it’s unfeasible for another enter to contain the identical output (MD5 now not does this since it’s insecure, nevertheless the fundamental system is still suitable)?Simplicity and ease of implementation. The